Cyber Security Computer Security
Cyber Security Computer Security
Cyber Security Computer Security
security) is the protection of computer systems and networks from information disclosure, theft of or
damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of
the services they provide.
The field is becoming increasingly significant due to the increased reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of “smart”
devices, including smartphones, televisions, and the various devices that constitute the “Internet of
things”.
The government of India is taking many initiatives to enhance cybersecurity. With the rapid development
of information technology, it is critical to provide a safe and secure cyberspace. The topic, ‘Cyber
Security’ comes under GS-III syllabus of the IAS Exam. This article will provide you with relevant facts
about cybersecurity.
What is Cyber?
The term, ‘Cyber’ is used in relation to the culture of computers, information technology, and virtual
reality. The connection between internet ecosystems forms cyberspace. The threat to cyberspace leads
to an issue and gives rise to the need for cybersecurity
Threats to Cyberspace:
1. Interconnectedness of Sectors
2. Increase in the number of exposure points
3. Concentration of assets
As per the NITI Aayog report, the threats to cyberspace have increased dramatically over the last 10
years. The cyber attacks lead to the exposure of:
1. Sensitive information
2. Personal information and
3. Business information
1. Cyber Attacks
2. Damage to Cyberspace
3. Misuse of Cyberspace
4. Economic Espionage
Cyber Security – Evolution
With the introduction of cyberattacks, cybersecurity initiatives have evolved. They are mentioned in the
table below:
1. Virus – It is a malware that self-replicates and spreads by inserting copies of itself into other executable
code or documents.
2. Hacking Websites – An unauthorized access to any website belonging in a personal or professional space
3. Malicious Codes – It is a kind of security threat where any code present in software tends to bring harmful
effects, breach the security of the system, or bring damage to the system.
4. Advanced Worm and Trojan – This is again a malware that camouflages as a regular software however
once accessed, brings damage to the hard drive, background systems and corrupts allocation systems
5. Identity Theft and Phishing – It is a cyber attack involving fraudulent emails posing as authorized entities in
order to induce people to reveal their information (personal and professional.)
6. DOS, DDOS – DOS stands for Denial-of-Service attack, and DDOS stands for Distributed Denial-of-Service
attack. The attackers make the machine or network unavailable by disrupting services of the host network
through the flood of superfluous requests to overload systems. And when such flooding of requests comes
from various ends, it is termed as DDOS.
7. Cyber Espionage – Usually when a government’s or important organization’s privacy is posed at risk due to
illegal use of computer networks to seek confidential information.
8. Cyber Warfare – Deliberately attacking the information systems through the use of computer technology to
disrupt the state’s activities, especially for military purposes.
The table below gives the list of cyberattacks that India has witnessed in the past:
Cyber Attacks in India Description of the Cyber Attacks
Coronavirus Pandemic Microsoft has reported that cyber crooks are using Covid-19 situation in
Based Cyber Attack 2020 to defraud people through phishing and ransomware in India and the
world
Wannacry Ransomware In May 2017, various computer networks in India were locked down by the
ransom-seeking hackers.
Data Theft In May 2017, the food tech company Zomato faced the theft of information of
17 million users.
Petya Ransomware Container handling functions at a terminal operated by the Danish firm AP
Moller-Maersk at Mumbai’s Jawaharlal Nehru Port Trust got affected
Mirai Botnet In September 2016, Mirai malware launched a DDoS attack on the website
of a well-known security expert.
Cyber Criminals
Cyber Terrorists
Cyber Espionage
Cyber Hacktivist
As per the Niti Ayog report, the following are the sets of the group behind the cybersecurity breaches
Outsiders
Internal Actors
State-affiliated actors
Multiple parties
Attacks in partnerships
Find the difference between Malware and Virus by visiting the linked article.
Types op
Cyber Security – Cyber Swachhta Kendra
It is the Botnet Cleaning and Malware Analysis Centre under the Indian Computer Emergency Response
Team (CERT-In) under the Ministry of Electronics and Information Technology (MeitY). The aim of Cyber
Swachhta Kendra is to promote awareness among Indian citizens to secure their data in computers,
mobile phones, and other electronic devices.
Cyber Surakshit Bharat MeitY in collaboration with National e-Governance Division (NeGD) came up
Initiative with this initiative in 2018 to build a cyber-resilient IT set up
a. Identity theft
b. Stalking
c. Bullying
d. Phishing
a. Kaspersky
b. Quick heal
c. Mcafee
3. A ____________ can be a hardware device or a software program that filters all the packets of data that comes
through a network, the internet, etc.
a. Firewall
b. Antivirus
c. Malware
d. Cookies
4. Which of these would refer to the exploration of the apt, ethical behaviours that are related to the digital media
platform and online environment?
a. Cybersecurity
b. Cybersafety
c. Cyberethics
d. Cyber low
a. Message Digest
b. Protocol
c. Decryption algorithm
d. Digital signature
6. Which of these ports and IP address scanners is popular among the users?
a. Ettercap
b. Snort
c. Angry IP Scanner
a. Null Scan
c. SYN Stealth
d. Cloud Scan
b. Computer Virus
d. Antivirus Program
a. Badware
b. Malicious Ware
c. Malware
d. Ilegalware
a. Reliability
b. Performance
c. Longevity
d. Security
a. Tinkered
b. Creeper
c. Ray Tomlinson
d. Reaper
12. The Hacker who did break the SIPRNET system is ___________.
a. Kevin Poulsen
c. Kevin Mitnick
d. John Draper
13. Using the cipher algorithm, which of these types of text would be transformed?
a. Plain text
b. Scalar text
c. Complex text
d. Transformed text
14. Which of the following malware types does not clone or replicate itself through infection?
a. Viruses
b. Worms
c. Trojans
d. Rootkits
15. The DNS would translate any Domain name into ___________.
a. IP
b. URL
c. Binary
d. Hex
16. Which of these is usually referred to as the port number (default) of several web servers like apache?
a. 40
b. 20
c. 87
d. 80
Answer: (d) 80
17. Which of these is a sort of independent type of malicious program that would not require any host program?
a. Virus
b. Trap Door
c. Worm
d. Trojan Horse
a. Confidentiality
b. Availability
c. Integrity
d. Authenticity
19. Which of these is the oldest techniques used by hackers for phone hacking to make free calls?
a. Phishing
b. Phreaking
c. Spraining
d. Cracking
a. DEFCON
b. OSCON
c. SECTION
d. DEVON